Wi-Fi WPS Protocol Security

mike5757

Member
Apr 18, 2011
49
0
66
Out of pure curiosity, I'm wondering how secure the transfer of the network password and other variables from the AP to the client is when using WPS. If someone intercepted the WPS handshake, could they get this information? Is the data encrypted?
 

Mushkins

Golden Member
Feb 11, 2013
1,631
0
0
It's not anywhere close to secure.

It's a marketing gimmick for people too stupid to configure wifi on their devices themselves, push the button and it just works! Theres actually quite a few major security flaws with it that can give an outside attacker easy access to your router, you should disable it wherever possible.
 

lagokc

Senior member
Mar 27, 2013
808
1
41
It's a marketing gimmick for people too stupid to configure wifi on their devices themselves, push the button and it just works

It also allows wifi printers to be cheaper to manufacture because they just need a little WPS button instead of a tiny LCD display and buttons to type in the passphrase. I suspect/hope some of those can have the wifi configured over USB though.
 

razel

Platinum Member
May 14, 2002
2,337
90
101
The venerability only exists after pushing the button. It's not even a venerability. It's just bad programming where they didn't bother to properly timeout the push button. The fix is simple, but there aren't very many router companies that pushed out firmware updates.

That is the sole reason why I have retired 2 wireless routers in my family. The good news! DD-WRT compatible routers (which get updated frequently) are much easier to find and far cheaper these days.
 

CA19100

Senior member
Jun 29, 2012
634
13
76
I suspect/hope some of those can have the wifi configured over USB though.

My Brother HL-2170W has nothing but a few LEDs on the front; no display. But I just briefly connected it via ethernet to configure it and set it up to join my wireless network (including WPA2 key), and it works fine. I'm assuming USB is an option as well, but never checked.
 

mike5757

Member
Apr 18, 2011
49
0
66
I understand that WPS is vulnerable due to some major flaws. My question was more about the exchange of data between the AP and the client after the button is pushed or the PIN is entered. I couldn't find anything on the details of the protocol used for that exchange. If the vulnerable PIN method was removed from the WPS standard, how secure would it be?
 

ch33zw1z

Lifer
Nov 4, 2004
38,096
18,569
146
I suspect/hope some of those can have the wifi configured over USB though.

Indeed they do. my in laws have a printer that setup the IP during initial setup over USB. Just my xp, doubt all of them are like this.
 

mikeymikec

Lifer
May 19, 2011
18,335
10,911
136
From what I've seen, certainly in the UK, product line-ups are being altered because some router manufacturers have withdrawn the WPS feature. Most notably the BT Home Hub no longer has WPS and the feature has been disabled with firmware updates on older versions of the hub. As BT is probably the most popular broadband provider in the UK, its decision to abandon WPS carries a lot of weight here.

In my experience, I have no idea why, but WPS rarely worked even when it was considered to be OK to use.

I understand that WPS is vulnerable due to some major flaws. My question was more about the exchange of data between the AP and the client after the button is pushed or the PIN is entered. I couldn't find anything on the details of the protocol used for that exchange. If the vulnerable PIN method was removed from the WPS standard, how secure would it be?

I don't know the specifics of its vulnerability, but even if the PIN method is removed, that requires a whole new version of the standard to be drafted, agreed to by the major manufacturers and rolled out. That takes time.
 

JackMDS

Elite Member
Super Moderator
Oct 25, 1999
29,484
391
126
Last edited:

mike5757

Member
Apr 18, 2011
49
0
66
24 hours of your time, a compatible laptop, and this to crack WPS
http://code.google.com/p/reaver-wps/

I actually did this the other day to an old router of mine. By my math it would've taken about 48 hours, and that was even considering my PIN starts with 0128. It was because it was only doing about one PIN every 30 seconds. I cheated and advanced the checking to just a few PINs ahead of the actual one haha.
 
sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |